This networking technology enables users to distribute data and electronic files over the Internet in a decentralized manner.
Peer-to-peer file sharing (P2P)
OR 1=1
What is a SQL Injection?
On September 9th, 1947, this became the world's first computer bug when a team of computer scientists at Harvard University discovered it.
A moth trapped in their computer.
Plaintext: Hello
Key: H=E E=B L=I L=I O=L
Cyphertext: EBIIL
This encryption method is named after a historical figure, who used it to protect messages of military significance.
It turned out to be easily broken and in modern practice offers essentially no communications security.
The Caesar Cipher. Named after Julius Caesar.
Tor, short for The Onion Router, was created by this branch of the US Military.
The US Navy.
A common networking tool, where each hop is identified between a soure and target.
Traceroute.
<b onmouseover=alert('WOW!')>click me!</b>
What is Cross Site Scripting (XSS)?
When small modifications made to a stop sign are able to fool self driving cars into ignoring the stop sign and driving through it, the specialized inputs that confuse the machine learning algorithm are called these.
Adversarial examples (images).
It is believed that larger realizations of this type of computer will be capable of solving integer factorization problems which could break RSA encryption faster than ever.
A Quantum Computer.
For about 20 years after its invention, it had few practical uses, then suddenly it revolutionized grocery checkouts & home audio.
The laser.
What is the 4th layer of the 7 layer OSI Model?
The Transport Layer
Pass 48 bytes to the program “aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabbbb” and see what happens.
Stack (Buffer) Overflow
Due to a single line of bad code, the AT&T network collapsed in this year, the year prior to the collapse of the Soviet Union
1990
This type of encryption is the first and only publicly accessible cipher approved by the NSA (The U.S. National Security Agency) for top secret information when used in an NSA approved cryptographic module.
AES (Advanced Encryption Standard)
Meraki was acquired in this year.
2012
The Krack attack on WPA2 relied on inducing re-use of these throwaway values in cryptographic operations.
Nonces
This amped up phenomenon crashed laptops when the hit song "Rhythm Nation" by Janet Jackson was played. The hard disks got rocked.
Resonance.
Loosely speaking, this resonance caused the natural vibrations in the hard disk devices (which really did contain hard disks back then, made of steel or glass and spinning at 5400rpm) to be amplified and exaggerated to the point that they would crash, bringing down Windows XP along with them.
This cryptographic algorithm is used by Bitcoin to ensure that funds can only be spent by their rightful owners.
Elliptic Curve Digital Signature Algorithm (ECDSA). The curve order and hash function used by bitcoin are these, Secp256k1 and SHA256(SHA256()), respectively.
One of Snowden's first revelations, this colorfully named NSA program focused on electronic data mining.
PRISM
Check out this fictional traceroute output measuring how long packets take to travel from SF to New York:
1 sf.example.com (208.64.252.229) 0.363 ms 0.427 ms 0.458 m
2 b.example.com (171.60.53.13) 79.011 m 78.988 m 79.004 m
3 c.example.com (171.64.1.12) 76.129 m 76.198 ms 76.087 m
4 d.example.com (171.64.255.144) 80.654 m
5 e.example.com (171.64.255.148) 80.605 m
6 f.example.com (171.64.255.149) 80.643 m
7 newyork.example.com (171.67.76.65) 84.204 ms 84.200 ms 84.215 m
Each router uses this protocol to send a packet back to the source.
ICMP (Internet Control Message Protocol)
0x3000: add edx, 4 ; edx = edx + 4
jmp [edx] ; jump to *edx
0x4000: add edx, 4 ; edx = edx + 4
mov eax, [edx] ; eax = *edx
jmp ecx ; jump to ecx
0x5000: mov ebx, eax ; ebx = eax
jmp ecx ; jump to ecx
0x6000: mov [eax], ebx ; *eax = ebx
...
Set the values of the registers and memory so that the vulnerable application writes the value 0x2222 to memory address 0x8888.
ecx=? edx=? eip=0x4000
0x9000 = ?
0x9004 = ?
0x9008 = ?
0x900c = ?
0x9010 = ?
0x9014 = ?
Hint: The application was compiled without any return instructions!
Jump Oriented Programming (JOP)
World War III was prevented in 1983 by Soviet Lt. Col. Stanislov Petrov when he decided to do nothing when a Soviet satellite misinterpreted this as a US ballistic missile launch.
The sun reflecting off of clouds.
This perennial technology used in bitcoin and other cryptocurrencies, is used to encrypt blockchain data more efficiently, quickly and securely. It is used to verify content across big datasets and to ensure consistency so that other peers do not lie and send fake blocks.
Merkle trees (or Binary hash trees). A mathematical data structure made up of hashes of various data blocks that summarize all the transactions in a block.
Solarwinds had a production FTP Server which could accessed for upload with this hilariously simple password.
solarwinds123